Synopsis: Moderate: squid security and bug fix update Advisory ID: SLSA-2015:2378-1 Issue Date: 2015-11-19 CVE Numbers: CVE-2015-3455 -- It was found that Squid configured with client-first SSL-bump did not correctly validate X.509 server certificate host name fields. A man-in- the-middle attacker could use this flaw to spoof a Squid server using a specially crafted X.509 certificate. (CVE-2015-3455) This update fixes the following bugs: * Previously, the squid process did not handle file descriptors correctly when receiving Simple Network Management Protocol (SNMP) requests. As a consequence, the process gradually accumulated open file descriptors. This bug has been fixed and squid now handles SNMP requests correctly, closing file descriptors when necessary. * Under high system load, the squid process sometimes terminated unexpectedly with a segmentation fault during reboot. This update provides better memory handling during reboot, thus fixing this bug. After installing this update, the squid service will be restarted automatically. -- SL7 x86_64 squid-3.3.8-26.el7.x86_64.rpm squid-debuginfo-3.3.8-26.el7.x86_64.rpm squid-sysvinit-3.3.8-26.el7.x86_64.rpm - Scientific Linux Development Team